Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:10
Behavioral task
behavioral1
Sample
8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe
-
Size
4.0MB
-
MD5
87a6f7b559ff3eaa4789313567f7b331
-
SHA1
d61df33e9a80ce68b4d17b49c8d9822a081aecf6
-
SHA256
8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c
-
SHA512
d25871d372b8b91883c422d5d690980893a4b60e7d433b383adc3a726baddf478bce828abd150a85bab01c3bdd182efe5d063bfd69090652d37cc417ee4f1ceb
-
SSDEEP
98304:Nv1wv7D8leVdvBmQc32rGeEw3Jn7GiLIfjD9TbF6wT7Q7S2V+:l1wv7DxTvBSAxEen7VYTbFzT7Q7
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2000-54-0x00000000009C0000-0x0000000001798000-memory.dmp family_ytstealer behavioral1/memory/2000-57-0x00000000009C0000-0x0000000001798000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2000-54-0x00000000009C0000-0x0000000001798000-memory.dmp upx behavioral1/memory/2000-57-0x00000000009C0000-0x0000000001798000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe 2000 8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1796 2000 8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe 29 PID 2000 wrote to memory of 1796 2000 8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe 29 PID 2000 wrote to memory of 1796 2000 8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe 29 PID 1796 wrote to memory of 472 1796 cmd.exe 31 PID 1796 wrote to memory of 472 1796 cmd.exe 31 PID 1796 wrote to memory of 472 1796 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe"C:\Users\Admin\AppData\Local\Temp\8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:472
-
-